Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Mar 2021 20:16:33 +0000 (UTC)
From:      Chris Rees <crees@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r568503 - head/security/vuxml
Message-ID:  <202103152016.12FKGXp9037776@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: crees
Date: Mon Mar 15 20:16:33 2021
New Revision: 568503
URL: https://svnweb.freebsd.org/changeset/ports/568503

Log:
  Document CVE-2015-4645 in sysutils/squashfs-tools
  
  Security:	CVE-2015-4645

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Mon Mar 15 20:11:39 2021	(r568502)
+++ head/security/vuxml/vuln.xml	Mon Mar 15 20:16:33 2021	(r568503)
@@ -78,6 +78,32 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="317487c6-85ca-11eb-80fa-14dae938ec40">
+    <topic>squashfs-tools -- Integer overflow</topic>
+    <affects>
+      <package>
+	<name>squashfs-tools</name>
+	<range><lt>4.4</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Phillip Lougher reports:</p>
+	<blockquote cite="https://github.com/plougher/squashfs-tools/commit/f95864afe8833fe3ad782d714b41378e860977b1">;
+	  <p>Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-4645</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2015-4645</url>;
+    </references>
+    <dates>
+      <discovery>2017-03-17</discovery>
+      <entry>2021-03-15</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="72709326-81f7-11eb-950a-00155d646401">
     <topic>go -- encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader; archive/zip: panic when calling Reader.Open</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202103152016.12FKGXp9037776>